Sciweavers

3792 search results - page 29 / 759
» Techniques for Trusted Software Engineering
Sort
View
APSEC
2003
IEEE
14 years 3 months ago
Case study: Reconnaissance techniques to support feature location using RECON2
Change requests are often formulated into concepts or features that a maintainer can understand. One of the main issues faced by a maintainer is to know and locate “where does t...
Suhaimi Ibrahim, Norbik Bashah Idris, Aziz Deraman
CSMR
2010
IEEE
13 years 4 months ago
Recognizing Words from Source Code Identifiers Using Speech Recognition Techniques
The existing software engineering literature has empirically shown that a proper choice of identifiers influences software understandability and maintainability. Researchers have n...
Nioosha Madani, Latifa Guerrouj, Massimiliano Di P...
CSMR
2003
IEEE
14 years 3 months ago
Software Clustering Techniques and the Use of Combined Algorithm
As the age of software systems increases they tend to deviate from their actual design and architecture. It becomes more and more difficult to manage and maintain such systems. We...
M. Saeed, Onaiza Maqbool, Haroon A. Babri, Syed Za...
CSIE
2009
IEEE
13 years 11 months ago
On Test Script Technique Oriented Automation of Embedded Software Simulation Testing
Succinct test script with high efficiency is one of key point for automation of embedded software testing. In this paper, we integrated object technique with automated simulation ...
Yongfeng Yin, Bin Liu, Bentao Zheng
ICSE
2007
IEEE-ACM
14 years 4 months ago
Cost-Benefit Analysis of Software Development Techniques and Practices
Investigations of software development practices, processes, and techniques frequently report separately on the costs and benefits of a phenomenon under study, but rarely adequate...
Hakan Erdogmus